Professor Yashar Ganjali Department of Computer Science University of Toronto.
|
|
- Brook Hoover
- 8 years ago
- Views:
Transcription
1 Professor Yashar Ganjali Department of Computer Science University of Toronto
2 Announcements Final project proposal Guidelines have been posted on class website. Each project completed by groups of two students Use class mailing list to find teammates if you don t know anyone in class. 1 page proposal Due: Fri. Oct 16 th at 5PM Intermediate report Key technologies 2 pages Due: Fri. Nov. 13 th at 5PM 2
3 Announcements Cont d Final presentation In class during the last two weeks 15 minute presentation Final report Put everything together 5 pages Due: Fri. Nov. 27 th at 5pm Volunteer for lecture notes? 3
4 The Story Introduction to computer networks Internet vs. mail The science of networks Characteristics, graphs, scale-free networks, Last week: Computer networks and healthcare This week: Computer networks and business 4
5 Outline New business opportunities Online shopping Digital content Online trading Search engines and online advertisement How networks benefit small and large businesses Efficiency, communication Technologies that made it possible Ethernet Virtual private networks 5
6 Networks Create New Possibilities Online shopping Amazon, ebay, Targeted advertisement Online banking Online trading Currency exchange Stocks e-commerce Remote meetings 6
7 Online Shopping Internet can help with traditional shopping Retail E.g. order furniture online Much more convenient and flexible Peer-to-peer ebay, Kijiji, Craigslist, Check the order status, delivery, online Electronic payments Credit cards, PayPal, 7
8 Selling Digital Content Internet has also created new possibilities ebooks, mp3s, videos, TV, Amazon, Apple itunes, Netflix, These are new forms of traditional books, CDs, Advantages Faster delivery (almost instant) Convenience Access your library from anywhere Costs less Targeted advertisements and marketing Good for advertisers and customers (?) 8
9 Advertisement on the Internet New form of advertising Advertise while people are surfing the web Have access to more information Based on past browsing history you can find out about the user s interests and target them with more accurate ads Might be useful for the customer as well And less annoying Can cost less Compared to TV, billboards, 9
10 Online Trading Stocks, stock options, currency exchange all possible in today s Internet The most important issues here are Network reliability: order should not be lost Delay: extremely tight guarantees for timing required It s all about timing, timing, timing Ordinary users: seconds to minutes Trading companies: nano seconds to micro seconds Online Trader ISP One ISP Two 10
11 Delay in Computer Networks Delay has three major components: Transmission delay: how long it takes for your machine to inject the traffic into network Propagation delay: how long it takes for data to traverse the distance between source and destination Queueing delay: how long your data packets sit in queues (buffers) on Internet routers 11
12 Outline New business opportunities Online shopping Digital content Online trading Search engines and online advertisement How networks benefit small and large businesses Efficiency, communication Technologies that made it possible Ethernet Virtual private networks 12
13 Search Engines You can find new things by looking for keywords Not ideal but works Question.What is the ideal way? You can find new things to buy That s why advertising on the Internet is such a big success We spend a lot of time behind computers these days Question.how do search engines know how to sort web pages? 13
14 Detour: Search Engines Question. How do search engines find web pages related to your search? They have a large number of robots that constantly crawl the web. You can simply make your own crawler. Write a script that downloads a given web page. Extracts all the links. If a link has not been downloaded before Download and repeat. B D A F C E 14
15 How To Find the Best Match There might be many pages that have the given keyword. Question. How to sort these pages and find the best match? Technique # 1. Show any page that has the given keyword, sort based on how many times the keyword appears Or use font size, font shape (bold or italic, ) as guides on how important that keyword is Question. Does this work? Why? 15
16 Finding the Best Match Cont d Technique # 2: Use the number of links to this page as a clue. The more the number of links, the higher the rank of this page. Question. Does this work? Why? Both techniques are vulnerable to attacks Someone can easily increase the rank of their page by Increasing the font size, frequency of the keywords, Or by creating fake pages pointing to this page 16
17 Use Reputation as the Criteria Basic idea: assign a credibility score to each page. Repeatedly update credibility score of each page Divide the credibility score by the number of outgoing links, and distribute it among them
18 Use Reputation as the Criteria Basic idea: assign a credibility score to each page. Repeatedly update credibility score of each page Divide the credibility score by the number of outgoing links, and distribute it among them
19 Use Reputation as the Criteria Basic idea: assign a credibility score to each page. Repeatedly update credibility score of each page Divide the credibility score by the number of outgoing links, and distribute it among them Question.Where do we start? This is the basic idea behind PageRank which is used by Google
20 Why This Matters Good search results means people will use your search engine That s why Google doesn t charge us Also, you need to find good matches between search results and advertisements Can enhance your return Question.Is it just a matter of good matching? Text vs. picture vs. animation Size of the ad Where it appears on a page 20
21 Outline New business opportunities Online shopping Digital content Online trading Search engines and online advertisement How networks benefit small and large businesses Efficiency, communication Technologies that made it possible Ethernet Virtual private networks 21
22 Benefits of Using Networks in Business Networks allow sharing the cost of peripherals Printers Scanners Shared data storage... Improved communication Locally Remotely Work from home Or while traveling 22
23 Efficiency Data is readily available Rather than looking for a physical file Can serve customers faster And better: shared data Reduce errors and improve consistency All staff work from the same source of information Make standard manuals and guidelines available Data can be backed up and checked for consistency 23
24 Outline New business opportunities Online shopping Digital content Online trading Search engines and online advertisement How networks benefit small and large businesses Efficiency, communication Technologies that made it possible Ethernet Virtual private networks 24
25 What Technologies Made This Possible Ethernet is the dominant networking technology for Local Area Networks (LANs) Extremely simple to setup Most of the time, just plug your computer and it works Very inexpensive to setup and maintain Supports both wired and wireless networking Relatively high rates: 10Mb/s to 100Gb/s 25
26 How Does Ethernet Work First, we need an address Remember the mail example: This is how other computers know how to find you Two ways to assign an address to your computer Manual setup We call this static IP address assignment Automatic setup We call this one dynamic IP address assignment The protocol used is called DHCP (Dynamic Host Configuration Protocol) 26
27 How Do Nodes Talk in Ethernet Shared communication medium (wired or wireless) Can lead to collision Think of two or more people talking in the classroom We need some sort of coordination to avoid collision Only one person speaks at a time How do we do this in real life? 27
28 How Do Nodes Talk in Ethernet Cont d Here is how Ethernet solves this problem Listen: if nobody else is talking you can start Otherwise wait till they finish While talking keep listening Nobody else talks à done! Why? Somebody starts talking à collision In case of collision Choose a random time in the future Repeat Question: How long should we wait before retrying? 28
29 Wireless Networking in an Office Easier to setup No need to physically connect nodes Inexpensive Very flexible Can handle many computers Different types of devices Mobility: computers can be moved easily No need to reconfigure 29
30 And The Problems Lower rate compared to wired networks Mb/s compared to 100Mb/s 1Gb/s or higher Shared medium Limited number of wireless channels available All machines are on the same medium In wired, you can have point-to-point connection Less secure Your signal can be heard by people nearby 30
31 Virtual Private Networks (VPNs) Your employees might want to connect to their business network from home, or while traveling Many security concerns Virtual Private Networks make this possible Remotely connect to your work network As if you are sitting in your office Access to all resources (databases, peripherals, ) All communications are encrypted Question.How do you build a VPN? 31
32 Remote Collaboration A lot of people work from home these days Long distance collaborations Researchers, students/mentors, Tons of tools to make this possible Voice/video conferencing and presentations Online sharing of documents Collaborative writing Google docs, MS OneNote, Energy savings, impact on environment Makes sense financially as well; gas prices going up 32
33 Other Areas of Impact Outsourcing Computer networks bring resources closer Ideally, customer won t see a difference Business-to-business services Not only you can provide service to your customers You can buy and sell products and services to other businesses E-Commerce Information diffusion? Information is money Technologies for fast distribution and aggregation of news 33
34 Summary and Discussion Computer networks have already changed the way we do business Online shopping, digital content, trading, e-commerce, advertisements, They provide many benefits for small and large businesses Communication, resource sharing, What other areas can you think of? What are the technologies we need to work on today? 34
Making the right connectivity decision for your company
Making the right connectivity decision for your company Executive Summary Deciding on the right connectivity is critical in assisting with the smooth running of any business. This paper is aimed at anyone
More informationVIDEO Intypedia012en LESSON 12: WI FI NETWORKS SECURITY. AUTHOR: Raúl Siles. Founder and Security Analyst at Taddong
VIDEO Intypedia012en LESSON 12: WI FI NETWORKS SECURITY AUTHOR: Raúl Siles Founder and Security Analyst at Taddong Hello and welcome to Intypedia. Today we will talk about the exciting world of security
More informationPolycom. RealPresence Ready Firewall Traversal Tips
Polycom RealPresence Ready Firewall Traversal Tips Firewall Traversal Summary In order for your system to communicate with end points in other sites or with your customers the network firewall in all you
More informationChapter 9A. Network Definition. The Uses of a Network. Network Basics
Chapter 9A Network Basics 1 Network Definition Set of technologies that connects computers Allows communication and collaboration between users 2 The Uses of a Network Simultaneous access to data Data
More informationIP Telephony Basics. Part of The Technology Overview Series for Small and Medium Businesses
IP Telephony Basics Part of The Technology Overview Series for Small and Medium Businesses What is IP Telephony? IP Telephony uses the Internet Protocol (IP) to transmit voice or FAX traffic over a public
More informationEECS 122: Introduction to Computer Networks Multiaccess Protocols. ISO OSI Reference Model for Layers
EECS 122: Introduction to Computer Networks Multiaccess Protocols Computer Science Division Department of Electrical Engineering and Computer Sciences University of California, Berkeley Berkeley, CA 94720-1776
More informationAccess the Test Here http://myspeed.visualware.com/index.php
VoIP Speed Test Why run the test? Running a VoIP speed test is an effective way to gauge whether your Internet connection is suitable to run a hosted telephone system using VoIP technology. A number of
More informationTeleworker User Guide
Teleworker User Guide Teleworker Service The Teleworker Service enables employees to work remotely with full access to voice mail, conferencing, and other features of the office phone system. The service
More informationLinksys Gateway SPA2100-SU Manual
Linksys Gateway SPA2100-SU Manual Manuel de l'utilisateur Table of Contents Looking for Basic Setup Instructions?... 3 Most Recent Version of this Manual... 3 Advanced Setup Instructions... 4 Wiring Your
More informationDesigning AirPort Extreme Networks
Designing AirPort Extreme Networks Contents 1 Getting Started 5 About AirPort 5 How AirPort Works 6 How Wireless Internet Access Is Provided 6 Configuring AirPort Extreme Base Station Internet Access
More informationR2. The word protocol is often used to describe diplomatic relations. How does Wikipedia describe diplomatic protocol?
Chapter 1 Review Questions R1. What is the difference between a host and an end system? List several different types of end systems. Is a Web server an end system? 1. There is no difference. Throughout
More informationRemote ESL Email On A Mac With OS-X Using SSH Tunneling & Port Forwarding
Remote ESL Email On A Mac With OS-X Using SSH Tunneling & Port Forwarding Excerpted from: http://adrianhoe.com/2006/10/22/secure-wireless-email-on-mac-os-x Wireless hotspots have blossomed in recent years
More informationFinal Exam. Route Computation: One reason why link state routing is preferable to distance vector style routing.
UCSD CSE CS 123 Final Exam Computer Networks Directions: Write your name on the exam. Write something for every question. You will get some points if you attempt a solution but nothing for a blank sheet
More informationPowerLink Bandwidth Aggregation Redundant WAN Link and VPN Fail-Over Solutions
Bandwidth Aggregation Redundant WAN Link and VPN Fail-Over Solutions Find your network example: 1. Basic network with and 2 WAN lines - click here 2. Add a web server to the LAN - click here 3. Add a web,
More informationWebStore Guide. The Uniform Solution
WebStore Guide The Uniform Solution Copyright 2009-2013 Premier Data Systems All rights reserved. This publication is protected by copyright and all rights are reserved by Premier Data Systems. It may
More informationNetworking Basics for Automation Engineers
Networking Basics for Automation Engineers Page 1 of 10 mac-solutions.co.uk v1.0 Oct 2014 1. What is Transmission Control Protocol/Internet Protocol (TCP/IP)------------------------------------------------------------
More informationChapter 1 Configuring Internet Connectivity
Chapter 1 Configuring Internet Connectivity This chapter describes the settings for your Internet connection and your wireless local area network (LAN) connection. When you perform the initial configuration
More informationNorthwest RPC Sector Summary
Public Safety: Number of Participants- 5 Q5: Key uses of internet: receiving updates; finding contact info; getting tools and equipment; news; advertisement; computer aided Dispatch Maintenance/ issue;
More informationSecurity Awareness. Wireless Network Security
Security Awareness Wireless Network Security Attacks on Wireless Networks Three-step process Discovering the wireless network Connecting to the network Launching assaults Security Awareness, 3 rd Edition
More informationComputer Networking Networks
Page 1 of 8 Computer Networking Networks 9.1 Local area network A local area network (LAN) is a network that connects computers and devices in a limited geographical area such as a home, school, office
More informationLocal-Area Network -LAN
Computer Networks A group of two or more computer systems linked together. There are many [types] of computer networks: Peer To Peer (workgroups) The computers are connected by a network, however, there
More informationComputer Networking. Definitions. Introduction
Computer Networking Definitions DHCP Dynamic Host Configuration Protocol It assigns IP addresses to client devices, such as desktop computers, laptops, and phones, when they are plugged into Ethernet or
More informationDeveloping a mobile strategy. How to make the most of new online opportunities
Developing a mobile strategy How to make the most of new online opportunities Contents 3 Executive summary 4 The mobile opportunity 5 A strategic approach 7 Mobile transactions 9 Key takeouts 10 About
More informationIntroduction to Computer Networks and Data Communications
Introduction to Computer Networks and Data Communications Chapter 1 Learning Objectives After reading this chapter, you should be able to: Define the basic terminology of computer networks Recognize the
More informationFREQUENTLY ASKED QUESTIONS: HOMEPLUG
FREQUENTLY ASKED QUESTIONS: HOMEPLUG 1. What is HomePlug / Powerline technology? Beginner 2. How do I set up a network with Aztech HomePlugs? Beginner 3. How will HomePlugs benefit me at home? Beginner
More informationChapter 5. Data Communication And Internet Technology
Chapter 5 Data Communication And Internet Technology Purpose Understand the fundamental networking concepts Agenda Network Concepts Communication Protocol TCP/IP-OSI Architecture Network Types LAN WAN
More informationHow Small Businesses Can Use Voice over Internet Protocol (VoIP) Internet Technology for Voice Communications
How Small Businesses Can Use Voice over Internet Protocol (VoIP) Internet Technology for Voice Communications Small businesses will find this booklet useful for learning how VoIP works and for clarifying
More informationCOMPUTERS ARE YOUR FUTURE CHAPTER 7 NETWORKS: COMMUNICATING AND SHARING RESOURCES
COMPUTERS ARE YOUR FUTURE CHAPTER 7 NETWORKS: COMMUNICATING AND SHARING RESOURCES Answers to End-of-Chapter Questions Matching g 1. router o 2. node i 3. ring l 4. hub c 5. star n 6. backbone b 7. latency
More informationVPN Overview. The path for wireless VPN users
VPN Overview The path for wireless VPN users First, the user's computer (the blue computer) connects to an access point in the uiuc-wireless-net network and is assigned an IP address in that range (172.21.0.0
More informationESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK
VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK Contemporary Control Systems, Inc. Understanding Ethernet Switches and Routers This extended article was based on a two-part article that was
More informationGuideline for setting up a functional VPN
Guideline for setting up a functional VPN Why do I want a VPN? VPN by definition creates a private, trusted network across an untrusted medium. It allows you to connect offices and people from around the
More informationSmall Business Server Part 2
Small Business Server Part 2 Presented by : Robert Crane BE MBA MCP director@ciaops.com Computer Information Agency http://www.ciaops.com Agenda Week 1 What is SBS / Setup Week 2 Using & configuring SBS
More informationWhat is a Home Network? A home network is a collection of two or more home computers connected together through a wired or wireless connection.
Building A Home Network What is a Home Network? A home network is a collection of two or more home computers connected together through a wired or wireless connection. Why should I network my computers
More informationGeneral Questions about TC3Net Residential DSL:
General Questions about TC3Net Residential DSL: DSL (Digital Subscriber Line) is broadband technology that provides high-speed data transmission (up to 7.1 Mbps) over an existing telephone line. Speeds
More informationRegion 10 Videoconference Network (R10VN)
Region 10 Videoconference Network (R10VN) Network Considerations & Guidelines 1 What Causes A Poor Video Call? There are several factors that can affect a videoconference call. The two biggest culprits
More informationDVR Network Security
DVR Network Security Page 1 of 12 Table of Contents TABLE OF CONTENTS... 2 GETTING STARTED... 4 INTRODUCTION... 4 DISCLAIMER... 4 BACKGROUND INFORMATION... 4 GENERAL BEST PRACTICES... 4 USE THE EQUIPMENT
More informationChapter 4 Managing Your Network
Chapter 4 Managing Your Network This chapter describes how to perform network management tasks with your ADSL2+ Modem Wireless Router. Backing Up, Restoring, or Erasing Your Settings The configuration
More informationThe Internet, Intranets, and Extranets. What is the Internet. What is the Internet cont d.
C H A P T E R 7 The Internet, Intranets, and Extranets What is the Internet Millions of computers, all linked together on a computer network. A home computer usually links to the Internet using a phone
More informationQuality of Service Analysis of site to site for IPSec VPNs for realtime multimedia traffic.
Quality of Service Analysis of site to site for IPSec VPNs for realtime multimedia traffic. A Network and Data Link Layer infrastructure Design to Improve QoS in Voice and video Traffic Jesús Arturo Pérez,
More information8 Steps for Network Security Protection
8 Steps for Network Security Protection cognoscape.com 8 Steps for Network Security Protection Many small and medium sized businesses make the mistake of thinking they won t be the target of hackers because
More informationSBSCET, Firozpur (Punjab), India
Volume 3, Issue 9, September 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Layer Based
More information8 Steps For Network Security Protection
8 Steps For Network Security Protection 8 Steps For Network Security Protection Many small and medium sized businesses make the mistake of thinking they won t be the target of hackers because of their
More informationFIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities Learning Objectives Name the common categories of vulnerabilities Discuss common system
More informationMasters of Science in Information Technology
Objective: At the end of this module, you must be able to 1. Establish a basic understanding of the Internet 2. Understand the Internet's evolution What is Internet? Internet is a vast collection of different
More informationApproaches for DDoS an ISP Perspective. barry@null0.net ognian.mitev@viawest.com
Approaches for DDoS an ISP Perspective barry@null0.net ognian.mitev@viawest.com Home School How everyone starts It s all up to you It s inexpensive (compared to other forms of education) Quality may not
More informationBroadband Bonding Network Appliance TRUFFLE BBNA6401
Broadband Bonding Network Appliance TRUFFLE BBNA6401 White Paper In this brief White Paper we describe how the TRUFFLE BBNA6401 can provide an SMB with faster and more reliable Internet access at an affordable
More informationInternet Quick Start Guide. Get the most out of your Midco internet service with these handy instructions.
Internet Quick Start Guide Get the most out of your Midco internet service with these handy instructions. 1 Contents Internet Security................................................................ 4
More informationTYPE OF INTERNET CONNECTIONS. Dialup Cable Connection DSL Broadband Dedicated Leased Line ISDN Wireless Connection
Internet Connections By Bhupendra Ratha, Lecturer School of Library and Information Science Devi Ahilya University, Indore Email: bhu261@gmail.com How to acquire Connection? We are Basically connected
More informationThe beginner s guide to content management systems
E-book The beginner s guide to content management systems A good website is regularly updated and grows over time. In this e-book we show you how administering the content on a hungry website shouldn t
More informationThe Power of Online Directories and How to Get Started Fast!
The Power of Online Directories and How to Get Started Fast! Introduction More and more small businesses today are using online directories to their benefit. If you run a small business then odds are you
More informationGetting ahead online. your guide to. GOL412_GBBO brochure_aw5.indd 1 10/2/10 10:10:01
1 Getting ahead online your guide to GOL412_GBBO brochure_aw5.indd 1 10/2/10 10:10:01 2 Welcome to Getting British Business Online Whether you re totally new to the Internet or already have a website,
More informationIntroduction, Rate and Latency
Introduction, Rate and Latency Communication Networks Why communicate? Necessary to support some application. Example Applications Audio communication Radio, Telephone Text communication Email, SMS (text
More informationWhat is a SSL VPN and How Does it Work?
Acceleration of Data through SSL Virtual Private Networks Rob Jansen University of Minnesota, Morris 600 East Fourth Street Morris, MN 56267 (123) 456-7890 jans0184@morris.umn.edu ABSTRACT A Virtual Private
More informationVOIP THE ULTIMATE GUIDE VERSION 1.0. 9/23/2014 onevoiceinc.com
VOIP THE ULTIMATE GUIDE VERSION 1.0 9/23/2014 onevoiceinc.com WHAT S IN THIS GUIDE? WHAT IS VOIP REQUIREMENTS OF A VOIP SYSTEM IMPLEMENTING A VOIP SYSTEM METHODS OF VOIP BENEFITS OF VOIP PROBLEMS OF VOIP
More informationConnecting via a Regular Modem
How to Share an Internet Connection Adapted from Chapter 5 of The Little Network Book, by Lon Poole and John Rizzo, illustrations by John Grimes This article is provided courtesy of Peachpit Press. ONE
More information@Home Cable Deployment Experiences or
@Home Cable Deployment Experiences or My years without sleep. Presented by Cathy Wittbrodt @Home Network Routing Diva Jan 1996-Mar 2000 What this presentation is A look at some of the technical and other
More informationBroadband v Ethernet
E DATA MOBILE VOICE DATA MOBILE Broadband v Ethernet the business buyer s guide Background: The importance of Internet for the SME Today, internet connectivity plays a pivotal role in the life of the typical
More informationTruffle Broadband Bonding Network Appliance
Truffle Broadband Bonding Network Appliance Reliable high throughput data connections with low-cost & diverse transport technologies PART I Truffle in standalone installation for a single office. Executive
More informationAgenda. Distributed System Structures. Why Distributed Systems? Motivation
Agenda Distributed System Structures CSCI 444/544 Operating Systems Fall 2008 Motivation Network structure Fundamental network services Sockets and ports Client/server model Remote Procedure Call (RPC)
More informationIn this section of notes you will learn the rudiments of networking, the components of a network and how to secure a network
Computer networking In this section of notes you will learn the rudiments of networking, the components of a network and how to secure a network What This Section Will And Will Not Cover What we will talk
More informationReplication with TeraStation 3000/4000/5000/7000. Buffalo Technology
Replication with TeraStation 3000/4000/5000/7000 Buffalo Technology Introduction Replication is synchronising a folder on two separate TeraStations in almost real time. It works in only one way not bi-directional,
More informationWhat communication protocols are used to discover Tesira servers on a network?
Understanding device discovery methods in Tesira OBJECTIVES In this application note, basic networking concepts will be summarized to better understand how Tesira servers are discovered over networks.
More informationOur 24 tips to get you trading online in 24 hours
Our 24 tips to get you trading online in 24 hours With e-commerce growing by 14% this year in the UK and online shopping figures at an all time high, there has never been a better time to set your business
More information5 Websites Where You Can Make Money Right Now
5 Websites Where You Can Make Money Right Now A Quick Guide to Making More Money by: Brian Lang (Small Business Ideas Blog) www.smallbusinessideasblog.com 5 Websites Where You Can Make Money Right Now
More informationCOMPUTER NETWORK TECHNOLOGY (300)
Page 1 of 10 Contestant Number: Time: Rank: COMPUTER NETWORK TECHNOLOGY (300) REGIONAL 2014 TOTAL POINTS (500) Failure to adhere to any of the following rules will result in disqualification: 1. Contestant
More informationComponent 4: Introduction to Information and Computer Science
Component 4: Introduction to Information and Computer Science Unit 7: Networks & Networking Lecture 1 This material was developed by Oregon Health & Science University, funded by the Department of Health
More informationFinal for ECE374 05/06/13 Solution!!
1 Final for ECE374 05/06/13 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam taker -
More informationAdvisors: Using Marketing to Build Your Pipeline. Presenter: Barbara Kotlyar Sr. Marketing Manager ByAllAccounts Managing Director, Bridge Marketing
Advisors: Using Marketing to Build Your Pipeline Presenter: Barbara Kotlyar Sr. Marketing Manager ByAllAccounts Managing Director, Bridge Marketing Who is this person and why should I listen to them? 88.4%
More information9 Simple steps to secure your Wi-Fi Network.
9 Simple steps to secure your Wi-Fi Network. Step 1: Change the Default Password of Modem / Router After opening modem page click on management - access control password. Select username, confirm old password
More informationHigh Speed Internet - User Guide. Welcome to. your world.
High Speed Internet - User Guide Welcome to your world. 1 Welcome to your world :) Thank you for choosing Cogeco High Speed Internet. Welcome to your new High Speed Internet service. When it comes to a
More informationWireless Home Network Setup. Dan Wenz Chris Kiscaden
Wireless Home Network Setup Dan Wenz Chris Kiscaden Key Questions Why is wireless beneficial? What are the necessary components? What do these components do? How do I set up a wireless network? Why wireless?
More informationAnalysis and Simulation of VoIP LAN vs. WAN WLAN vs. WWAN
ENSC 427 Communication Networks Final Project Report Spring 2014 Analysis and Simulation of VoIP Team #: 2 Kadkhodayan Anita (akadkhod@sfu.ca, 301129632) Majdi Yalda (ymajdi@sfu.ca, 301137361) Namvar Darya
More information1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network
Review questions 1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network B Local area network C Client/server
More informationHow to Search the Internet
Technology In Action 1 Technology In Action Chapter 3 Using the Internet: Making the Most of the Web s Resources 2 Topics Internet basics Internet data Internet service providers Web browsers URLs Hyperlinks
More informationNetworking. Topic 5. Contents
97 Topic 5 Networking Contents 5.1 Introduction...................................... 99 5.2 Networks....................................... 99 5.2.1 The development of networks........................
More informationWireless Links - Wireless communication relies on radio signals or infrared signals for transmitting data.
Uses of a network A network is a way to connect computers so that they can communicate, exchange information and share resources in real time. Networks enable multiple users to access shared data and programs
More informationVPN Configuration Guide. Linksys (Belkin) LRT214 / LRT224 Gigabit VPN Router
VPN Configuration Guide Linksys (Belkin) LRT214 / LRT224 Gigabit VPN Router 2014 equinux AG and equinux USA, Inc. All rights reserved. Under copyright law, this manual may not be copied, in whole or in
More informationOSBRiDGE 5XLi. Configuration Manual. Firmware 3.10R
OSBRiDGE 5XLi Configuration Manual Firmware 3.10R 1. Initial setup and configuration. OSBRiDGE 5XLi devices are configurable via WWW interface. Each device uses following default settings: IP Address:
More informationChoosing the right Internet solution for your business.
Choosing the right Internet solution for your business. Choosing the right Internet solution for your business. Let s face it, when it comes to the Internet it s all about speed and reliability. Slow connections
More informationChapter 4 Firewall Protection and Content Filtering
Chapter 4 Firewall Protection and Content Filtering This chapter describes how to use the content filtering features of the ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN to protect your network.
More informationDatagram-based network layer: forwarding; routing. Additional function of VCbased network layer: call setup.
CEN 007C Computer Networks Fundamentals Instructor: Prof. A. Helmy Homework : Network Layer Assigned: Nov. 28 th, 2011. Due Date: Dec 8 th, 2011 (to the TA) 1. ( points) What are the 2 most important network-layer
More informationMcAfee.com Personal Firewall
McAfee.com Personal Firewall 1 Table of Contents Table of Contents...2 Installing Personal Firewall...3 Configuring Personal Firewall and Completing the Installation...3 Configuring Personal Firewall...
More informationMN-700 Base Station Configuration Guide
MN-700 Base Station Configuration Guide Contents pen the Base Station Management Tool...3 Log ff the Base Station Management Tool...3 Navigate the Base Station Management Tool...4 Current Base Station
More informationClient Information Pack
WISP Ltd. This is your guide to using our broadband Internet service. It contains important and useful information - keep it to hand. Name: Address Contact Details Website: E-mail: http://www.wispbroadband.co.uk/
More informationTCP/IP Protocol Suite. Marshal Miller Chris Chase
TCP/IP Protocol Suite Marshal Miller Chris Chase Robert W. Taylor (Director of Information Processing Techniques Office at ARPA 1965-1969) "For each of these three terminals, I had three different sets
More informationNetwork Configuration Settings
Network Configuration Settings Many small businesses already have an existing firewall device for their local network when they purchase Microsoft Windows Small Business Server 2003. Often, these devices
More informationWHICH PLATFORM For My Website
WHICH PLATFORM For My Website CONTENTS INTRODUCTION 1. 3. 4. 5 9. 10. 11. 13. 14. Introduction Your domain name Why choose a CMS platform? Choose the right Content Management System Add features Do you
More informationBT Business Total Broadband User Guide
BT Business Total Broadband User Guide Contents To install your BT Business Hub, follow your handy Quick Start guide. This User Guide contains more detailed set-up and service information, including troubleshooting.
More informationIntroduction: Why do we need computer networks?
Introduction: Why do we need computer networks? Karin A. Hummel - Adapted slides of Prof. B. Plattner, plattner@tik.ee.ethz.ch - Add-on material included of Peterson, Davie: Computer Networks February
More informationHow to Set Up a Wireless Network. How to configure a wireless network for a computer science programming contest using PC 2
How to Set Up a Wireless Network How to configure a wireless network for a computer science programming contest using PC 2 Checklist: The procedure to set up a wireless network is not difficult at all.
More information8 Google AdWords ad extensions you should know.
8 Google AdWords ad extensions you should know. Have you heard about the changes Google made to its AdRank formula? What do they mean, and how do they apply to you? Ultimately, what they mean is that you
More informationNETWORKING TECHNOLOGIES
NETWORKING TECHNOLOGIES (October 19, 2015) BUS3500 - Abdou Illia, Fall 2015 1 LEARNING GOALS Identify the major hardware components in networks. Identify and explain the various types of computer networks.
More informationCITS1231 Web Technologies. Client, Server, the Internet, and the Web
CITS1231 Web Technologies Client, Server, the Internet, and the Web Topic Outline How does the Internet work Client Server Architecture Connections Communications Protocols Addressing Routing One of the
More informationCompetencies (1 of 2)
Chapter 2 The Internet, the Web, and Electronic Commerce Competencies (1 of 2) Discuss the origins of the Internet and the Web Describe how to access the Web using providers and browsers Discuss Internet
More informationI. What is VPN? II. Types of VPN connection. There are two types of VPN connection:
Table of Content I. What is VPN?... 2 II. Types of VPN connection... 2 III. Types of VPN Protocol... 3 IV. Remote Access VPN configuration... 4 a. PPTP protocol configuration... 4 Network Topology... 4
More informationSection #6: Addressing
Section #6: Addressing Problem 1: Routing entries Consider the following routing table for router A, given in CIDR ( slash-n ) notation: 56.162.0.0/15: Port 0 56.164.0.0/15: Port 1 56.166.0.0/16: Port
More informationThe Internet. Charging for Internet. What does 1000M and 200M mean? Dr. Hayden Kwok-Hay So
The Internet CCST9015 Feb 6, 2013 What does 1000M and 200M mean? Dr. Hayden Kwok-Hay So Department of Electrical and Electronic Engineering 2 Charging for Internet One is charging for speed (How fast the
More informationCisco Virtual Office Express
. Q&A Cisco Virtual Office Express Overview Q. What is Cisco Virtual Office Express? A. Cisco Virtual Office Express is a solution that provides secure, rich network services to workers at locations outside
More information